[prev in list] [next in list] [prev in thread] [next in thread]
List: oss-security
Subject: Re: [oss-security] Wireshark 1.2.16 / 1.4.5
From: Josh Bressers <bressers () redhat ! com>
Date: 2011-04-18 20:23:30
Message-ID: 286851831.43477.1303158210927.JavaMail.root () zmail01 ! collab ! prod ! int ! phx2 ! redhat ! com
[Download RAW message or body]
----- Original Message -----
> Hi,
>
> I noticed that new wireshark versions 1.2.16/1.4.5 were released on
> 14th/15th April 2011 and some of issues fixed appear to have security
> impact
>
> 1. Use of un-initialised variables:
> https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5793
> https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5754
> Patch:
> http://anonsvn.wireshark.org/viewvc?revision=36608&view=revision
> Versions affected: 1.2.0 to 1.2.15 and 1.4.0 to 1.4.4
Please use CVE-2011-1590
>
> 2. Buffer overflow in DECT dissector
> The advisory does not list the bug number or the relevant patch.
Please use CVE-2011-1591
>
> 3. Crash in NFS dissector
> https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5209
> Versions affected: 1.4.0 to 1.4.4.
> This affects Windows only.
>
> http://www.wireshark.org/security/wnpa-sec-2011-05.html
> http://www.wireshark.org/security/wnpa-sec-2011-06.html
>
Please use CVE-2011-1592
Thanks.
--
JB
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic